what's new
378 Topics- What’s New in Microsoft Teams | October 2025Before we get to this month’s new Teams features, I’m thrilled to share that Microsoft has been recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Unified Communications as a Service for the 7th year in a row. We are honored to again be positioned highest for ability to execute and furthest for completeness of vision in the evaluation’s axes. We believe this recognition underscores the product innovations we delivered over this past year, such as the launch of agents in meetings and a redesigned chat and channels experience, to make Microsoft Teams the AI-powered platform for work—one that is simple, smart, and secure. In our opinion, the support and trust of our customers and partners helped make this recognition possible. We’re deeply grateful to the hundreds of millions of users who turn to Teams to get their work done and our partners whose expertise and commitment amplify the impact of Teams worldwide. If you’ve been a member of the Microsoft tech community for a while, you might be aware that next month, we’ll highlight many exciting new Teams features at Microsoft Ignite and in our special What’s new in Teams Ignite edition blog. That’s going to be something to look forward to, but this month, we’ve got plenty of new productivity-boosting updates to celebrate too. The power of Copilot continues to grow. We first introduced meeting recaps to help you quickly catch up on what you missed, now we’re taking them further. With audio recap, your written recaps are transformed into dynamic audio experiences you can listen to anytime, anywhere. Teams Rooms just leveled up too, with smarter voice and face recognition and real-time caption translations. And if you’re a Teams Rooms on Android user, Facilitator is now available to help keep your meetings productive and on track. Explore all the latest additions and updates below! *GARTNER is a registered trademark and service mark of Gartner and Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Microsoft. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. New features released this month: Chat and collaboration Meetings, webinars, and town halls Teams Phone Workplace: Places and Teams Rooms Certified for Teams Devices Chat and collaboration Summarize files shared in Teams chat with Copilot When a file is shared in a chat, you don’t always have the time to open it, read through, and grasp the key ideas. With file summaries in 1:1 and group chats in Teams, Microsoft 365 Copilot can quickly summarize content from Microsoft Word documents so you can understand the main points without opening the file. This feature is also available on mobile, making it easier to grasp key ideas without reading an entire document on a small screen while on the move. It respects the file's security policies, ensuring that only users with access to the file receive a summary, which will carry the same sensitivity label as the original file. Add emoji updated keyboard shortcut Use colons to quickly insert the emoji you want without slowing down to use the mouse. Type : followed by the name of the emoji you want, then type : again. Once done, the emoji is selected and added to your text. The new shortcut aligns with industry standards and helps make emoji insertion intuitive and consistent. You can now type keywords to find both standard and custom emojis using the improved search. Meetings, webinars, and town halls Audio recap now generally available Staying informed shouldn’t mean being glued to your screen. That’s why we’re introducing audio recap, a new way to catch up on your meetings. With audio recap, your meeting recap is transformed into an audio experience you can listen to on the go. Whether you’re commuting, walking between meetings, or simply prefer listening, it’s a hands-free way to stay connected and informed. You can generate an audio recap for up to eight meetings at a time, and choose the delivery style that best fits how you want to listen: Newscast—one AI speaker delivering a fast, concise summary Executive—two AI speakers offering an efficient summary with minimal commentary. Casual—two AI speakers providing a summary with extra color and commentary. All your audio recaps are easily accessible from the meeting recap page, ready to replay anytime. And with availability on both desktop and mobile, you can catch up wherever work takes you. Support for multiple camera views and IntelliFrame from Teams Rooms on Windows in Teams webinar and structured meetings Multiple camera views and IntelliFrame (Multi-stream and cloud) from Teams Rooms on Windows are now available in Teams webinar and structured meetings with "Manage what attendees see" enabled. Organizers and presenters of these meetings can access intelligent camera views and bring them on the live stage for attendees. Available with Teams Rooms Pro. Event Chat now available in Town halls for GCC, GCCH and DoD [Premium] Teams is bringing richer engagement to your Town halls on more cloud environments. With Event Chat, organizers and attendees in GCC, GCCH, and DoD environments can now interact in real time during Town hall sessions. This feature enables secure, threaded conversations, allowing participants to share insights, ask questions, and stay connected throughout the event. After the session ends, the chat remains accessible for follow-up discussions, ensuring continuity and collaboration beyond the live broadcast. Teams Phone Intelligent recap popout window in Calls app Users can now access Intelligent recap pop-out pages through the Calls app. Intelligent recap uses AI to automatically provide a comprehensive overview of your recorded or transcribed calls, helping users save time catching up and coordinating next steps. Go to the Calls app, look up the transcribed or recorded call in the call history, and select "View recap". This will launch the call’s Intelligent recap as a new pop-out page containing AI-generated discussion summary notes and recommended tasks to help users quickly find the most important information from the call. Teams Phone Mobile is now generally available with AT&T Teams Phone Mobile enables end-users to make and receive calls using a single number across their mobile phone and all their Teams endpoints. AT&T customers can now enjoy seamless mobile and Teams integration with this unified calling experience. Learn more about how IT admins can configure Teams Phone Mobile in Teams admin center and view the expanding set of mobile operators providing Teams Phone Mobile. Phone Devices: Improved Feedback Sharing for Teams Certified Phone Devices Giving feedback on Teams-certified Phone devices just got easier. Previously, users rated their experience with a 1–5 star score, and then had the option to type additional comments—a process that could feel cumbersome on a phone’s touch screen keyboard. Now, after you select your rating, Teams will suggest text prompts tailored to your score, making it simple to share what’s working well or what could be improved. You can still add your own notes for extra detail, but the new prompts help streamline feedback and save time. Phone devices: Enhanced Call Transfer experiences Teams Phone certified devices now have an improved interface that simplifies transfer actions. Users can select “Consult first” to place the original caller on hold and privately speak with the recipient before completing the transfer. The “Transfer” option is only enabled after the consult recipient answers the call to reduce the risk of adding the original caller back into the call prematurely. Direct transfers without a consultation step provide real-time status updates such as “Transferring [User A] to [User B]” while the transfer is in progress and “Successfully completed” at the conclusion. This visibility into the call transfer progress helps the transferrer know when it is safe to disconnect. Workplace: Places and Teams Rooms Facilitator agent for scheduled meetings in Teams Rooms on Android You can now take advantage of the Facilitator agent in Teams Rooms on Android for real-time AI-generated notes, follow up items, and keeping everyone updated on time during scheduled meetings. Facilitator appears in the meeting chat, and participants can toggle between notes, chat, and the agent. Available in rooms licensed for Teams Rooms Pro. Learn more here. Cloud IntelliFrame support on Teams Rooms on Android Now Cloud IntelliFrame, the AI-based cloud technology that optimizes views of in-room participants for hybrid meetings, is available for Teams Rooms on Android using group framing. Group framing delivers a more natural hybrid meeting experience by focusing on individuals, allowing remote attendees to see visual expressions and gestures better. It is set as the default in Teams Rooms on Android rooms, while remaining disabled by default in others. Admins can enable or disable IntelliFrame through console settings. Learn more here. Dynamic video tile resizing based on occupancy count from Teams Rooms on Android The room video tile dynamically adjusts size based on the number of people in the room. When one person is in the room, the tile matches the remote participant's size. With two or more people, the room tile expands to be four times larger. Admins can manage this behavior through console settings. Live caption translation in Teams Rooms on Android You can now choose the translation language you prefer from 40 supported spoken languages without affecting what other meeting participants see in Teams Rooms on Android. Previously, live captions were displayed in the spoken language by default, but this change allows individuals to select their own experience. This feature is available on Teams Rooms Pro. Learn more here. Join Town Halls and Webinars as an attendee from Teams Rooms on Android Microsoft Teams Rooms on Android can now join Town Halls and webinars in Teams as attendees. You can attend directly from the invited Teams Room, with the same features that attendees have on the Teams desktop app. Available in Teams Rooms Pro. Learn more. Front-of-room view control for Town Hall and Webinar in Teams Rooms on Windows or Android When a Teams Rooms on Windows (available now) or Android (available in November) is invited as a meeting presenter, the front-of-room display defaults to the attendee view. Presenters always have full control from the console, including green room and off-stage management, and can switch the front-of-room display to presenter view without impacting attendees. Available in Teams Rooms Pro. Learn more here. Enhanced production experience for Town hall in Teams Rooms on Windows The enhanced ‘Manage what attendees see’ feature gives Town hall hosts greater control over what attendees experience. Organizers, co-organizers, and presenters joining from a Teams Room on Windows with a Pro license can manage which presenters can be seen and heard at any time during a large-scale event, creating an organized, polished experience for viewers. Organizers licensed for Teams Premium can adjust layout, background, and name tag changes through the Teams Desktop. Learn more here. Simplified device settings for voice and face recognition on Teams Rooms on Windows or Android It's now easier for admins to enable the benefits of benefits of Copilot and intelligent audio and video features for users in Teams Rooms through a new user interface and admin settings. These new settings, on the device and in the Pro Management portal, simplify configuration and remove the requirement to use PowerShell, offering improved visibility across rooms. Learn more here. People count captured by Cloud IntelliFrame in the Pro Management portal reports Admins get enhanced visibility into room usage from Pro Management portal reports with detailed occupancy data captured by Cloud IntelliFrame during meetings. This insight helps IT more effectively plan and optimize meeting spaces, and is currently available for Teams Rooms on Windows licensed with Teams Rooms Pro. Learn more here. Recommended actions page in the Teams Rooms Pro Management portal This new page in the Pro Management portal provides proactive recommendations based on your organization’s environment and upcoming events that can impact devices, such as support or certification expirations. Admins are prompted to update device and account data enabling rich insights from the portal. Additional guidance based on space and device usage data is coming soon. This feature helps admins maintain smooth operations - planning and budgeting efficiently. At least one Teams Rooms Pro or Teams Shared Devices license is required for access. Learn more here. Certified for Teams Devices MAXHUB Express Install A–F: Simplifying Teams Rooms for Every Space The MAXHUB Express Install series makes setting up Microsoft Teams Rooms easier than ever. All six versions feature the integrated MAXHUB Smart Stand, streamlined cable management, and reliable audio/video for seamless collaboration. Every bundle supports BYOD, single-cable deployment, and comes with a 3-year warranty and local support. Display size: Versions A–D include a 43" display; E and F upgrade to 55". Videobar & kit: Choose between USB or Android-based videobars, with Pro kits offering enhanced performance. Room fit: A–D are ideal for huddle and focus rooms, while E and F are designed for small rooms. No matter your space or tech preference, there’s a MAXHUB Express Install to fit your Teams Rooms needs. Version Display Size Videobar Type Kit Type Room Size Target Key Features/Extras A 43" UC S07 USB Videobar XCore Kit Huddle/Focus XT10-VB Kit, streamlined setup B 43" XBar U50 USB Videobar XCore Kit Huddle/Focus USB videobar, BYOD flexibility C 43" XBar U50 USB Videobar XCore Kit Pro Huddle/Focus Pro kit for enhanced performance D 43" V50 Android Videobar MDEP V50 Kit Huddle/Focus Android-based, console included E 55" XBar U50 USB Videobar XCore Kit Pro Small Room Larger display, Pro kit F 55" V50 Android Videobar MDEP V50 Kit Small Room Larger display, Android-based kit Lenovo ThinkVision T24D-4v and T27QD-4v ThinkVision T27QD-4v and T27QD-4v are 24 and 27-inch QHD VoIP monitors with Microsoft Teams certification, designed to enhance your online collaboration experience. Dedicated Teams and VoIP buttons get you to your meeting with a click. Two noise-cancellation microphones, coupled with two 5W speakers and a 5MP QHD webcam ensure your video conferences and meetings run without any hiccups. Superior connectivity with a one-cable docking solution provides up to 100W of power delivery, data and internet. Enjoy content that looks completely stutter-free and color accurate with 99% sRGB & BT.709 color space and 48-120Hz variable refresh rate. Eye Comfort 5-star and Eyesafe 2.0 certified display technology significantly reduces harmful blue light emissions to benefit eye health.1.4KViews0likes0Comments
- Go agentless with Microsoft Sentinel Solution for SAPWhat a title during Agentic AI times 😂 📢UPDATE: Agentless reached GA! See details here. Dear community, Bringing SAP workloads under the protection of your SIEM solution is a primary concern for many customers out there. The window for defenders is small “Critical SAP vulnerabilities being weaponized in less than 72 hours of a patch release and new unprotected SAP applications provisioned in cloud (IaaS) environments being discovered and compromised in less than three hours.” (SAP SE + Onapsis, Apr 6 2024) Having a turn-key solution as much as possible leads to better adoption of SAP security. Agent-based solutions running in Docker containers, Kubernetes, or other self-hosted environemnts are not for everyone. Microsoft Sentinel for SAP’s latest new capability re-uses the SAP Cloud Connector to profit from already existing setups, established integration processes, and well-understood SAP components. Meet agentless ❌🤖 The new integration path leverages SAP Integration Suite to connect Microsoft Sentinel with your SAP systems. The Cloud integration capability of SAP Integration Suite speaks all relevant protocols, has connectivity into all the places where your SAP systems might live, is strategic for most SAP customers, and is fully SAP RISE compatible by design. Are you deployed on SAP Business Technology Platform yet? Simply upload our Sentinel for SAP integration package (see bottom box in below image) to your SAP Cloud Integration instance, configure it for your environment, and off you go. Best of all: The already existing SAP security content (detections, workbooks, and playbooks) in Microsoft Sentinel continues to function the same way as it does for the Docker-based collector agent variant. The integration marks your steppingstone to bring your SAP threat signals into the Unified Security Operations Platform – a combination of Defender XDR and Sentinel – that looks beyond SAP at your whole IT estate. Microsoft Sentinel solution for SAP applications is certified for SAP S/4HANA Cloud, Private Edition RISE with SAP, and SAP S/4HANA on-premises. So, you are all good to go😎 You are already dockerized or agentless? Then proceed to this post to learn more about what to do once the SAP logs arrived in Sentinel. Final Words During the preview we saw drastically reduced deployment times for SAP customers being less familiar with Docker, Kubernetes and Linux administration. Cherry on the cake: the network challenges don’t have to be tackled again. The colleagues running your SAP Cloud Connector went through that process a long time ago. SAP Basis rocks 🤘 Get started from here on Microsoft Learn. Find more details on our blog on the SAP Community. Cheers Martin1.5KViews1like0Comments
- Microsoft Sentinel for SAP Agentless connector GADear Community, Today is the day: Our new agentless connector for Microsoft Sentinel Solution for SAP applications is Generally Available now! Fully onboarded to SAP’s official Business Accelerator Hub and ready for prime time wherever your SAP systems are waiting – on-premises, hyperscalers, RISE, or GROW – to be protected. Let’s hear from an agentless customer: “With the Microsoft Sentinel Solution for SAP and its new agentless connector, we accelerated deployment across our SAP landscape without the complexity of containerized agents. This streamlined approach elevated our SOC’s visibility into SAP security events, strengthened our compliance posture, and enabled faster, more informed incident response” SOC Specialist, North American aviation company Use the video below to kick off your own agentless deployment today. #Kudos to the amazing mvigilante for showing us around the new connector! But we didn’t stop there! Security is being reengineered for the AI era - moving from static, rule-based controls to platform-driven, machine-speed defence that anticipates threats before they strike. Attackers think in graphs - Microsoft does too. We’re bringing relationship-aware context to Microsoft Security - so defenders and AI can see connections, understand the impact of a potential compromise (blast radius), and act faster across pre-breach and post-breach scenarios including SAP systems - your crown jewels. See it in action in below phishing-compromise which lead to an SAP login bypassing MFA with followed operating-system activities on the SAP host downloading trojan software. Enjoy this clickable experience for more details on the scenario. Shows how a phishing compromise escalated to an SAP MFA bypass, highlighting cross-domain correlation. The Sentinel Solution for SAP has AI-first in mind and directly integrates with our security platform on the Defender portal for enterprise-wide signal correlation, Security Copilot reasoning, and Sentinel Data Lake usage. Your real-time SAP detections operate on the Analytics tier for instant results and threat hunting, while the same SAP logs get mirrored to the lake for cost-efficient long-term storage (up to 12 years). Access that data for compliance reporting or historic analysis through KQL jobs on the lake. No more – yeah, I have the data stored somewhere to tick the audit report check box – but be able to query and use your SAP telemetry in long term storage at scale. Learn more here. Findings from the Agentless Connector preview During our preview we learned that majority of customers immediately profit from the far smoother onboarding experience compared to the Docker-based approach. Deployment efforts and time to first SAP log arrival in Sentinel went from days and weeks to hours. ⚠️ Deprecation notice for containerized data connector agent ⚠️ The containerised SAP data connector will be deprecated on 30 September 2026. This change aligns with the discontinuation of the SAP RFC SDK, SAP's strategic integration roadmap, and customer demand for simpler integration. Migrate to the new agentless connector for simplified onboarding and compliance with SAP’s roadmap. All new deployments starting October 31, 2025, will only have the new agentless connector option, and existing customers should plan their migration using the guidance on Microsoft Learn. It will be billed at the same price as the containerized agent, ensuring no cost impact for customers. Note📌: To support transition for those of you on the Docker-based data connector, we have enhanced our built-in KQL functions for SAP to work across data sources for hybrid and parallel execution. Spotlight on new Features Inspired by the feedback of early adopters we are shipping two of the most requested new capabilities with GA right away. Customizable polling frequency: Balance threat detection value (1min intervals best value) with utilization of SAP Integration Suite resources based on your needs. ⚠️Warning! Increasing the intervals may result in message processing truncation to avoid SAP CPI saturation. See this blog for more insights. Refer to the max-rows parameter and SAP documentation to make informed decisions. Customizable API endpoint path suffix: Flexible endpoints allow running all your SAP security integration flows from the agentless connector and adherence to your naming strategies. Furthermore, you can add the community extensions like SAP S/4HANA Cloud public edition (GROW), the SAP Table Reader, and more. Displays the simplified onboarding flow for the agentless SAP connector You want more? Here is your chance to share additional feature requests to influence our backlog. We would like to hear from you! Getting Started with Agentless The new agentless connector automatically appears in your environment – make sure to upgrade to the latest version 3.4.05 or higher. Sentinel Content Hub View: Highlights the agentless SAP connector tile in Microsoft Defender portal, ready for one-click deployment and integration with your security platform The deployment experience on Sentinel is fully automatic with a single button click: It creates the Azure Data Collection Endpoint (DCE), Data Collection Rule (DCR), and Microsoft Entra ID app registration assigned with RBAC role "Monitoring Metrics Publisher" on the DCR to allow SAP log ingest. Explore partner add-ons that build on top of agentless The ISV partner ecosystem for the Microsoft Sentinel Solution for SAP is growing to tailor the agentless offering even further. The current cohort has flagship providers like our co-engineering partner SAP SE themselves with their security products SAP LogServ & SAP Enterprise Threat Detection (ETD), and our mutual partners Onapsis and SecurityBridge. Ready to go agentless? ➤ Get started from here ➤ Explore partner add-ons here. ➤ Share feature requests here. Next Steps Once deployed, I recommend to check AryaG’s insightful blog series for details on how to move to production with the built-in SAP content of agentless. Looking to expand protection to SAP Business Technology Platform? Here you go. #Kudos to the amazing Sentinel for SAP team and our incredible community contributors! That's a wrap 🎬. Remember: bringing SAP under the protection of your central SIEM isn't just a checkbox - it's essential for comprehensive security and compliance across your entire IT estate. Cheers, Martin404Views1like0Comments
- What's New in Excel (October 2025)This month, look for Agent Mode in Excel (Frontier) in the Tools menu of Copilot for Excel. Additionally, PivotTable #SPILL and accessibility assistant updates are now available to Insider users on Windows and Mac. Formula by Example has also rolled out to the Current Channel for Excel on Windows.5.9KViews1like0Comments
- Microsoft Sentinel’s AI-driven UEBA ushers in the next era of behavioral analyticsCo-author - Ashwin Patil Security teams today face an overwhelming challenge: every data point is now a potential security signal and SOCs are drowning in complex logs, trying to find the needle in the haystack. Microsoft Sentinel User and Entity Behavior Analytics (UEBA) brings the power of AI to automatically surface anomalous behaviors, helping analysts cut through the noise, save time, and focus on what truly matters. Microsoft Sentinel UEBA has already helped SOCs uncover insider threats, detect compromised accounts, and reveal subtle attack signals that traditional rule-based methods often miss. These capabilities were previously powered by a core set of high-value data sources - such as sign-in activity, audit logs, and identity signals - that consistently delivered rich context and accurate detections. Today, we’re excited to announce a major expansion: Sentinel UEBA now supports six new data sources including Microsoft first- and third-party platforms like Azure, AWS, GCP, and Okta, bringing deeper visibility, broader context, and more powerful anomaly detection tailored to your environment. This isn’t just about ingesting more logs. It’s about transforming how SOCs understand behavior, detect threats, and prioritize response. With this evolution, analysts gain a unified, cross-platform view of user and entity behavior, enabling them to correlate signals, uncover hidden risks, and act faster with greater confidence. Newly supported data sources are built for real-world security use cases: Authentication activities MDE DeviceLogonEvents – Ideal for spotting lateral movement and unusual access. AADManagedIdentitySignInLogs – Critical for spotting stealthy abuse of non - human identities. AADServicePrincipalSignInLogs - Identifying anomalies in service principal usage such as token theft or over - privileged automation. Cloud platforms & identity management AWS CloudTrail Login Events - Surfaces risky AWS account activity based on AWS CloudTrail ConsoleLogin events and logon related attributes. GCP Audit Logs - Failed IAM Access, Captures denied access attempts indicating reconnaissance, brute force, or privilege misuse in GCP. Okta MFA & Auth Security Change Events – Flags MFA challenges, resets, and policy modifications that may reveal MFA fatigue, session hijacking, or policy tampering. Currently supports the Okta_CL table (unified Okta connector support coming soon). These sources feed directly into UEBA’s entity profiles and baselines - enriching users, devices, and service identities with behavioral context and anomalies that would otherwise be fragmented across platforms. This will complement our existing supported log sources - monitoring Entra ID sign-in logs, Azure Activity logs and Windows Security Events. Due to the unified schema available across data sources, UEBA enables feature-rich investigation and the capability to correlate across data sources, cross platform identities or devices insights, anomalies, and more. AI-powered UEBA that understands your environment Microsoft Sentinel UEBA goes beyond simple log collection - it continuously learns from your environment. By applying AI models trained on your organization’s behavioral data, UEBA builds dynamic baselines and peer groups, enabling it to spot truly anomalous activity. UBEA builds baselines from 10 days (for uncommon activities) to 6 months, both for the user and their dynamically calculated peers. Then, insights are surfaced on the activities and logs - such as an uncommon activity or first-time activity - not only for the user but among peers. Those insights are used by an advanced AI model to identify high confidence anomalies. So, if a user signs in for the first time from an uncommon location, a common pattern in the environment due to reliance on global vendors, for example, then this will not be identified as an anomaly, keeping the noise down. However, in a tightly controlled environment, this same behavior can be an indication of an attack and will surface in the Anomalies table. Including those signals in custom detections can help affect the severity of an alert. So, while logic is maintained, the SOC is focused on the right priorities. How to use UEBA for maximum impact Security teams can leverage UEBA in several key ways. All the examples below leverage UEBA’s dynamic behavioral baselines looking back up to 6 months. Teams can also leverage the hunting queries from the "UEBA essentials" solution in Microsoft Sentinel's Content Hub. Behavior Analytics: Detect unusual logon times, MFA fatigue, or service principal misuse across hybrid environments. Get visibility into geo-location of events and Threat Intelligence insights. Here’s an example of how you can easily discover Accounts authenticating without MFA and from uncommonly connected countries using UEBA behaviorAnalytics table: BehaviorAnalytics | where TimeGenerated > ago(7d) | where EventSource == "AwsConsoleSignIn" | where ActionType == "ConsoleLogin" and ActivityType == "signin.amazonaws.com" | where ActivityInsights.IsMfaUsed == "No" | where ActivityInsights.CountryUncommonlyConnectedFromInTenant == True | evaluate bag_unpack(UsersInsights, "AWS_") | where InvestigationPriority > 0 // Filter noise - uncomment if you want to see low fidelity noise | project TimeGenerated, _WorkspaceId, ActionType, ActivityType, InvestigationPriority, SourceIPAddress, SourceIPLocation, AWS_UserIdentityType, AWS_UserIdentityAccountId, AWS_UserIdentityArn Anomaly detection Identify lateral movement, dormant account reactivation, or brute-force attempts, even when they span cloud platforms. Below are examples of how to discover UEBA Anomalous AwsCloudTrail anomalies via various UEBA activity insights or device insights attributes: Anomalies | where AnomalyTemplateName in ( "UEBA Anomalous Logon in AwsCloudTrail", // AWS ClousTrail anomalies "UEBA Anomalous MFA Failures in Okta_CL", "UEBA Anomalous Activity in Okta_CL", // Okta Anomalies "UEBA Anomalous Activity in GCP Audit Logs", // GCP Failed IAM access anomalies "UEBA Anomalous Authentication" // For Authentication related anomalies ) | project TimeGenerated, _WorkspaceId, AnomalyTemplateName, AnomalyScore, Description, AnomalyDetails, ActivityInsights, DeviceInsights, UserInsights, Tactics, Techniques Alert optimization Use UEBA signals to dynamically adjust alert severity in custom detections—turning noisy alerts into high-fidelity detections. The example below shows all the users with anomalous sign in patterns based on UEBA. Joining the results with any of the AWS alerts with same AWS identity will increase fidelity. BehaviorAnalytics | where TimeGenerated > ago(7d) | where EventSource == "AwsConsoleSignIn" | where ActionType == "ConsoleLogin" and ActivityType == "signin.amazonaws.com" | where ActivityInsights.FirstTimeConnectionViaISPInTenant == True or ActivityInsights.FirstTimeUserConnectedFromCountry == True | evaluate bag_unpack(UsersInsights, "AWS_") | where InvestigationPriority > 0 // Filter noise - uncomment if you want to see low fidelity noise | project TimeGenerated, _WorkspaceId, ActionType, ActivityType, InvestigationPriority, SourceIPAddress, SourceIPLocation, AWS_UserIdentityType, AWS_UserIdentityAccountId, AWS_UserIdentityArn, ActivityInsights | evaluate bag_unpack(ActivityInsights) Another example shows anomalous key vault access from service principal with uncommon source country location. Joining this activity with other alerts from the same service principle increases fidelity of the alerts. You can also join the anomaly UEBA Anomalous Authentication with other alerts from the same identity to bring the full power of UEBA into your detections. BehaviorAnalytics | where TimeGenerated > ago(1d) | where EventSource == "Authentication" and SourceSystem == "AAD" | evaluate bag_unpack(ActivityInsights) | where LogonMethod == "Service Principal" and Resource == "Azure Key Vault" | where ActionUncommonlyPerformedByUser == "True" and CountryUncommonlyConnectedFromByUser == "True" | where InvestigationPriority > 0 Final thoughts This release marks a new chapter for Sentinel UEBA—bringing together AI, behavioral analytics, and cross-cloud and identity management visibility to help defenders stay ahead of threats. If you haven’t explored UEBA yet, now’s the time. Enable it in your workspace settings and don’t forget to enable anomalies as well (in Anomalies settings). And if you’re already using it, these new sources will help you unlock even more value. Stay tuned for our upcoming Ninja show and webinar (register at aka.ms/secwebinars), where we’ll dive deeper into use cases. Until then, explore the new sources, use the UEBA workbook, update your watchlists, and let UEBA do the heavy lifting. UEBA onboarding and setting documentation Identify threats using UEBA UEBA enrichments and insights reference UEBA anomalies reference4.5KViews5likes5Comments
- Modernize security operations to secure agentic AI—Microsoft Sentinel at Ignite 2025Security is a core focus at Microsoft Ignite this year, with the Security Forum on November 17, deep dive technical sessions, theater talks, and hands-on labs designed for security leaders and practitioners. Join us in San Francisco, November 17–21, or online, November 18–20, to learn what’s new and what’s next across SecOps, data, cloud, and AI—and how to get more from the Microsoft capabilities you already use. This year, Microsoft Sentinel takes center stage with sessions and labs designed to help you unify data, automate response, and leverage AI-powered insights for faster, more effective threat detection. Featured sessions: BRK235: Power agentic defense with Microsoft Sentinel Explore Microsoft Sentinel’s platform architecture, graph intelligence, and agentic workflows to automate, investigate, and respond with speed and precision. BRK246: Blueprint for building the SOC of the future Learn how to architect a modern SOC that anticipates and prevents threats using predictive shielding, agentic AI, and graph-powered reasoning. LAB543: Perform threat hunting in Microsoft Sentinel Dive deep into advanced threat hunting, KQL queries, and proactive investigation workflows to sharpen your security operations. Explore and filter the full security catalog by topic, format, and role: aka.ms/Ignite/SecuritySessions. Why attend: Ignite is your opportunity to see the latest innovations in Microsoft Sentinel, connect with experts, and gain hands-on experience. Sessions will also touch on future directions for agentic AI and unified SOC operations, as outlined in Microsoft’s broader security roadmap. Security Forum (November 17): Kick off with an immersive, in‑person pre‑day focused on strategic security discussions and real‑world guidance from Microsoft leaders and industry experts. Select Security Forum during registration. Connect with peers and security leaders through these signature security experiences: Security Leaders Dinner—CISOs and VPs connect with Microsoft leaders. CISO Roundtable—Gain practical insights on secure AI adoption. Secure the Night Party—Network in a relaxed, fun setting. Register for Microsoft Ignite >141Views0likes0Comments